StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Reporting Forensic Evidence - Research Paper Example

Cite this document
Summary
The paper "Reporting Forensic Evidence" highlights that the investigation procedures and tools utilized in the forensic investigation of any form of theft must be clear. When these set procedures are followed correctly by forensic investigators then it will be easy to catch the criminals…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.9% of users find it useful
Reporting Forensic Evidence
Read Text Preview

Extract of sample "Reporting Forensic Evidence"

? Reporting Forensic Evidence Task: Reporting Forensic Evidence It is very critical and essential for any forensic investigator carrying out any form of forensic investigation to be familiar with the types of the data collected to be used as the final forensic report. This is because the attorney will evidently use the report obtained while in court and can unfortunately be utilized by the opposing attorney during the court case. Thus, the forensic investigator ought to be ready to prepare an elaborate and comprehensive report which can be used by any party involved. Therefore, the report ought to be more formal for clear presentation. For instance, in the report of the investigation that involves a group of criminal enterprise, a comprehensive report is to be produced. Therefore, the forensic investigators can apply the use of a computer to carry out the forensic procedures. Computer forensic is thus the utilization of the computer applications and also analysis for the discovery of any legal evidence involved in the field of forensics. The use of the computer to practice the forensic investigations enables a quick identification and capture of the potential criminal through the use of vital data in the computer (Stauffer & Bonfanti, 2006). During the forensic investigation process, some of the things that were accomplished are the process of gathering the critical details of the potential suspects. This can only be achieved when the forensic investigators are rightly granted a warrant. This warrant allows them to carry out the forensic investigation procedures without any limits. Therefore, the investigators first must obtain a legal warrant from the authority to enable them access any form of information from individuals. Furthermore, the evidence obtained by the investigator must not be interfered with. For instance, in the computer forensic investigation, the computers must not be touched or even moved once the incidence has occurred. The investigators must further protect the data and the system and its components so as to be used for the prosecution in the court. Moreover, a continued chain of custody is maintained. Eventually, during the retrieval of the data of the suspects, the investigator ought to be extremely careful so as to avoid any distortion of data contained in the computer. Consequently, the evidence collected by the forensic investigator ought to meet some set requirements. These includes that the evidence ought to be produced then also be professionally authenticated and furthermore be of the best evidence available (Stauffer & Bonfanti, 2006). There are numerous types of systems that are employed during the examination procedures of the forensic investigation. The evidence gathered by the investigator varies widely. Some of these evidences are obtained from the computer includes theft of the intellectual property; there is also theft of the trade secrets. For instance, the investigators can employ the manual form of collecting forensic evidence or they can employ the computer technology method in the collection of the forensic evidences. The computer method used in the collecting evidences of any form of crime is the latest developed procedure. This technique is quick and also among the most effective procedure to be utilized. The forensic investigators utilize the computer forensic to gather any forensic evidences to be utilized in court. For instance, the evidence obtained for criminals, theft, deaths, and all forms of suicides (Anastasi, 2003). Additionally, a variety of tools are employed by the forensic investigator during the investigation process. Thus for an effective process in the forensic investigation, a smarty decision ought to be made on the best and most valuable tools to be utilized. This is to enable the investigator have an accurate analysis of the evidences obtained. These tools employed by the investigators can also be created by individuals who are experienced. Unfortunately, this idea is not embraced by many because it is hard to convince an individual that the types of the forensic investigation software they have developed have met the required standards set by the authority. Therefore for a more competent form of forensic tools, it ought to have a backup, also data recovery software, a disk editing, and also an IP tracking, also an authentication, moreover a log file, as well as a decryption, and a file examination. Some of the tools utilized include the document examiner. This tool is utilized when there are a lot of documents to be read by the parties involved. Moreover, this tool is employed when the types of document that needs to be opened and be read have been stored in numerous types of programs. Thus by employing this tool it becomes easier to open any document with ease. For instance, there is the program called the quick view which is designed to open and read numerous types of documents that are stored in different formats. Second, there is the tool of audit log file which is used in the record all the vital details and the activities on the computer. For instance, the tool is capable of recording all the data and records of the computer that has been changed or even delete. It is also competent of recording all the information of who has logged into a given computer and also logged off details. This tool thus assists the forensic investigators in finding details and information about theft. They are competent of accomplishing this by visiting the cookies of the computer to be able to get information of suspects who logged into the computer. Additionally, there is the decryption tool that is utilized in gaining access to any computer that has been protected by passwords. The forensic investigators are capable of accessing the suspect’s details in the computer by using this tool. This is accomplished by utilizing the decrypt software to crack the suspect’s password (Anastasi, 2003). The evidence preservation process that was employed includes the utilization of the computer forensic procedures. The data of the criminals were collected and then stored in the computer for evidence in court. Additionally, examples of region that require to be expanded in the field of investigation are the areas of the storage and also preservation of the collected forensic details. This is to ensure and guarantee that there is no any form of alteration of the evidences collected by the investigator. Therefore, for the forensic investigator to be capable of performing the process of the evidence preservation, they must be experts who are fully trusted and are further utilized the recommended sets of procedures for the collection f evidence from a criminal. This is only possible and acceptable after an accepted confirmation by the forensic investigation body (Ec- Council, 2009). Eventually, the chief synopsis of the preliminary findings that is to be included in the final forensic report is the type of the system utilize during the evidence collection, the tools employed by the investigator during the collection and furthermore the storage of the evidence before its presentation in court (Ec- Council, 2009). In tentative conclusion, the investigation procedures and tools utilized in the forensic investigation of any form of theft must be clear and also comprehensive. Subsequently, when these set procedures and also laws are followed correctly by the forensic investigators then it will be extraordinarily easy to catch the criminals. References Anastasi, J. (2003). The new forensic: investigating corporate fraud and the theft of intellectual property. New Jersey, NJ: Wiley and sons publication. Ec- Council. (2009). Investigation procedures and response. New York, NY: Cengage learning publishers. Stauffer, E., & Bonfanti, M. ( 2006). Forensic investigation of stolen- recovered and other crime – related vehicles. Oxford, UK: Elsevier Inc. publishers. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Reporting Forensic Evidence Research Paper Example | Topics and Well Written Essays - 1000 words”, n.d.)
Reporting Forensic Evidence Research Paper Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/information-technology/1435578-reporting-forensic-evidence
(Reporting Forensic Evidence Research Paper Example | Topics and Well Written Essays - 1000 Words)
Reporting Forensic Evidence Research Paper Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/information-technology/1435578-reporting-forensic-evidence.
“Reporting Forensic Evidence Research Paper Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1435578-reporting-forensic-evidence.
  • Cited: 0 times

CHECK THESE SAMPLES OF Reporting Forensic Evidence

Disposition of Toxic Drugs and Chemicals

hellip; The author explains that Forensic Science deals with the study of serology and DNA especially in the forensic crime laboratory, “serology analysis” refers to the screening of evidence for bodily fluids.... The evidence is processed and note taking is performed during serology analysis as this is the first time the evidence is unwrapped in the laboratory.... It is the responsibility of the serologists for documenting the type, quality and packaging of the evidence that is received in the laboratory....
8 Pages (2000 words) Lab Report

Examination of Paint and Glass

The final aim of the experiment was to discover any evidence that showed or qualified Mark Jones and the perpetrator of the crime in question.... Physical Examination of evidence: The suspect items were collected carefully, and a physical examination was done as the observations were recorded on the results sheet....
5 Pages (1250 words) Lab Report

Computing Security & Computing Forensics

This report "Computing Security & Computing Forensics" discusses computer hacking that has persisted for the best part of last year making the banks in the United Kingdom lose thousands of dollars.... The government should not terrify its people about the dangers of malware.... hellip; Many methods are put in place to curb the effect of the malware but the most effective outstanding method is IT hygiene....
6 Pages (1500 words) Report

Use of the Web

This report called "Use of the Web" describes the changes in the web and the advancements which are enabling people to do different things.... The author outlines all the issues associated with Web 2.... and advances in technology.... From this work, it is obvious about the details of the systems and the future application of the process....
7 Pages (1750 words) Report

Forensic Science as a Very Important Element in Law Enforcement and Administration of Justice

Other than the use of an electronic microscope, it is important to denote that there are a variety of chemical methods that can be used to analyze evidence (Shelton, 2012).... This paper "forensic Science as a Very Important Element in Law Enforcement and Administration of Justice" focuses on the fact that the evolution of forensic science can be traced to thousands of years ago.... Fingerprint technology is amongst the firsts applications of forensic science....
7 Pages (1750 words) Report

Comparing and Contrasting Android and iOS Forensics

This paper ''Comparing and Contrasting Android and iOS Forensics'' tells that A physical forensic examination is different from a logical one, as applicable to mobile devices like iOS and Android.... While physical and logical methods are applicable for extraction of data for forensic purposes, analytical methods are better as they use communication protocol provided by the mobile device....
5 Pages (1250 words) Report

Investigation of Crytolocker

The report does is unbiased for it bases on the data gathered from the evidence that is tabled by the Company's team.... However, the report does is unbiased for it bases on the data gathered from the evidence that is tabled by the Company's incident response team.... Wireshark is a network monitoring and analysis tools that are utterly vital in the difficult and demanding task that requires finesse and hard-core evidence of real data linked with the network....
17 Pages (4250 words) Report

Polymerase Chain Reaction as a Method of DNA Fingerprinting

It would be impossible to do forensic with small amounts of DNA without PCR, due to its ability to amplify the sequence of DNA which is a prior requirement in any study.... … The paper "Polymerase Chain Reaction as a Method of DNA Fingerprinting" is a great example of a lab report on biology....
6 Pages (1500 words) Lab Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us